Zobrazeno 1 - 10
of 55
pro vyhledávání: '"Gondow, Katsuhiko"'
Although numerous defenses against memory vulnerability exploits have been studied so far, highly-compatible, precise, and efficient defense is still an open problem. In fact, existing defense methods have at least one of the following problems: they
Externí odkaz:
http://arxiv.org/abs/2302.07717
Publikováno v:
2021 28th Asia-Pacific Software Engineering Conference (APSEC), pp. 223-232
Consistency is one of the keys to maintainable source code and hence a successful software project. We propose a novel method of extracting the intent of programmers from source code of a large project (~300kLOC) and checking the semantic consistency
Externí odkaz:
http://arxiv.org/abs/2203.09960
Publikováno v:
2021 28th Asia-Pacific Software Engineering Conference (APSEC), pp. 360-368
We investigated how programmers express high-level concepts such as path names and coordinates using primitive data types. While relying too much on primitive data types is sometimes criticized as a bad smell, it is still a common practice among prog
Externí odkaz:
http://arxiv.org/abs/2203.09959
Publikováno v:
Proceedings of 2018 25th Asia-Pacific Software Engineering Conference (APSEC), pp. 325-334
We are trying to find source code comments that help programmers understand a nontrivial part of source code. One of such examples would be explaining to assign a zero as a way to "clear" a buffer. Such comments are invaluable to programmers and iden
Externí odkaz:
http://arxiv.org/abs/1905.02050
Publikováno v:
コンピュータソフトウェア. 39(No. 4):97-128
Publikováno v:
2021 28th Asia-Pacific Software Engineering Conference (APSEC).
We investigated how programmers express high-level concepts such as path names and coordinates using primitive data types. While relying too much on primitive data types is sometimes criticized as a bad smell, it is still a common practice among prog
Publikováno v:
IEICE Transactions on Information and Systems. (no. 9):2179-2189
Autor:
Kobayashi, Takashi, Gondow, Katsuhiko, SAEKI, MOTOSHI, Shudo, Kazuyuki, Nishizaki, Shin-ya, Morimoto, Chikako, WAKITA, KEN
Publikováno v:
第 4 回実践的 IT 教育シンポジウム (rePiT2018) 予稿集. :40-48